CVE-2022-31806 – Insecure default settings in CODESYS Runtime Toolkit 32 bit full and CODESYS PLCWinNT
https://notcve.org/view.php?id=CVE-2022-31806
In CODESYS V2 PLCWinNT and Runtime Toolkit 32 in versions prior to V2.4.7.57 password protection is not enabled by default and there is no information or prompt to enable password protection at login in case no password is set at the controller. En CODESYS V2 PLCWinNT y Runtime Toolkit 32 en versiones anteriores a V2.4.7.57, la protección por contraseña no está habilitada por defecto y no se presenta información o aviso para habilitar la protección por contraseña en el inicio de sesión en caso de que no sea establecida una contraseña en el controlador • https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17140&token=6aa2c5c4a8b83b8b09936fefed5b0b11f9d2cc6c&download= • CWE-1188: Initialization of a Resource with an Insecure Default •
CVE-2022-31805 – Insecure transmission of credentials
https://notcve.org/view.php?id=CVE-2022-31805
In the CODESYS Development System multiple components in multiple versions transmit the passwords for the communication between clients and servers unprotected. En CODESYS Development System, varios componentes en diversos versiones transmiten las contraseñas para la comunicación entre clientes y servidores sin protección • https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17140&token=6aa2c5c4a8b83b8b09936fefed5b0b11f9d2cc6c&download= • CWE-523: Unprotected Transport of Credentials •
CVE-2022-1965 – CODESYS runtime system prone to file deletion due to improper error handling
https://notcve.org/view.php?id=CVE-2022-1965
Multiple products of CODESYS implement a improper error handling. A low privilege remote attacker may craft a request, which is not properly processed by the error handling. In consequence, the file referenced by the request could be deleted. User interaction is not required. diversos productos de CODESYS implementan un manejo de errores inapropiado. Un atacante remoto poco privilegiado puede diseñar una petición, que no es procesada apropiadamente por el manejo de errores. • https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17139&token=ec67d15a433b61c77154166c20c78036540cacb0&download= • CWE-755: Improper Handling of Exceptional Conditions •
CVE-2021-34596 – CODESYS V2 runtime: Access of Uninitialized Pointer may result in denial-of-service
https://notcve.org/view.php?id=CVE-2021-34596
A crafted request may cause a read access to an uninitialized pointer in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition. Una petición diseñada puede causar un acceso de lectura a un puntero no inicializado en CODESYS V2 Runtime Toolkit 32 Bit full y PLCWinNT versiones anteriores a V2.4.7.56, resultando en una condición de denegación de servicio • https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=16878&token=e5644ec405590e66aefa62304cb8632df9fc9e9c&download= • CWE-824: Access of Uninitialized Pointer •
CVE-2021-34595 – CODESYS V2 runtime: out-of-bounds read or write access may result in denial-of-service
https://notcve.org/view.php?id=CVE-2021-34595
A crafted request with invalid offsets may cause an out-of-bounds read or write access in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition or local memory overwrite. Una petición diseñada con valores no válidos puede causar un acceso de lectura o escritura fuera de límites en CODESYS V2 Runtime Toolkit 32 Bit full y PLCWinNT versiones anteriores a V2.4.7.56, resultando en una condición de denegación de servicio o una escritura excesiva de memoria local • https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=16878&token=e5644ec405590e66aefa62304cb8632df9fc9e9c&download= • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-823: Use of Out-of-range Pointer Offset •